GENERATING KEYS USING CONTROLLED CORRUPTION IN COMPUTER NETWORKS

    公开(公告)号:US20240305459A1

    公开(公告)日:2024-09-12

    申请号:US18665246

    申请日:2024-05-15

    IPC分类号: H04L9/08 H04L9/14 H04L9/32

    摘要: The present invention is a platform and/or agnostic method and system operable to protect data, documents, devices, communications, and transactions. Embodiments of the present invention may be operable to authenticate users and may be operable with any client system. The method and system are operable to disburse unique portions of anonymous related information amongst multiple devices. These devices disburse unique portions of anonymous information and are utilized by the solution to protect sensitive data transmissions, and to authenticate users, data, documents, device and transactions. When used for authentication, login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.

    System and method for generating and depositing keys for multi-point authentication

    公开(公告)号:US11336446B2

    公开(公告)日:2022-05-17

    申请号:US17080488

    申请日:2020-10-26

    摘要: The present invention is an platform and/or agnostic authentication method and system operable to authenticate users, data, documents, device and transactions. Embodiments of the present invention may be operable with any client system. The authentication method and system are operable to disburse unique portions of anonymous login related information amongst multiple devices. These devices and the disburse unique portions of anonymous login information are utilized by the solution to authenticate users, data, documents, device and transactions. Login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.

    System and method for generating and depositing keys for multi-point authentication

    公开(公告)号:US10819516B2

    公开(公告)日:2020-10-27

    申请号:US16436142

    申请日:2019-06-10

    摘要: The present invention is an platform and/or agnostic authentication method and system operable to authenticate users, data, documents, device and transactions. Embodiments of the present invention may be operable with any client system. The authentication method and system are operable to disburse unique portions of anonymous login related information amongst multiple devices. These devices and the disburse unique portions of anonymous login information are utilized by the solution to authenticate users, data, documents, device and transactions. Login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.

    SYSTEM AND METHOD FOR GENERATING AND DEPOSITING KEYS FOR MULTI-POINT AUTHENTICATION

    公开(公告)号:US20190123901A1

    公开(公告)日:2019-04-25

    申请号:US16165606

    申请日:2018-10-19

    IPC分类号: H04L9/08 H04L9/32 H04L9/14

    摘要: The present invention is an platform and/or agnostic authentication method and system operable to authenticate users, data, documents, device and transactions. Embodiments of the present invention may be operable with any client system. The authentication method and system are operable to disburse unique portions of anonymous login related information amongst multiple devices. These devices and the disburse unique portions of anonymous login information are utilized by the solution to authenticate users, data, documents, device and transactions. Login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.

    GENERATING KEYS USING CONTROLLED CORRUPTION IN COMPUTER NETWORKS

    公开(公告)号:US20220329423A1

    公开(公告)日:2022-10-13

    申请号:US17843509

    申请日:2022-06-17

    IPC分类号: H04L9/08 H04L9/32 H04L9/14

    摘要: The present invention is a platform and/or agnostic method and system operable to protect data, documents, devices, communications, and transactions. Embodiments of the present invention may be operable to authenticate users and may be operable with any client system. The method and system are operable to disburse unique portions of anonymous related information amongst multiple devices. These devices disburse unique portions of anonymous information and are utilized by the solution to protect sensitive data transmissions, and to authenticate users, data, documents, device and transactions. When used for authentication, login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.

    SYSTEM AND METHOD FOR GENERATING AND DEPOSITING KEYS FOR MULTI-POINT AUTHENTICATION

    公开(公告)号:US20210044436A1

    公开(公告)日:2021-02-11

    申请号:US17080488

    申请日:2020-10-26

    IPC分类号: H04L9/08 H04L9/32 H04L9/14

    摘要: The present invention is an platform and/or agnostic authentication method and system operable to authenticate users, data, documents, device and transactions. Embodiments of the present invention may be operable with any client system. The authentication method and system are operable to disburse unique portions of anonymous login related information amongst multiple devices. These devices and the disburse unique portions of anonymous login information are utilized by the solution to authenticate users, data, documents, device and transactions. Login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.

    GENERATING KEYS USING CONTROLLED CORRUPTION IN COMPUTER NETWORKS

    公开(公告)号:US20200274708A1

    公开(公告)日:2020-08-27

    申请号:US16872127

    申请日:2020-05-11

    IPC分类号: H04L9/08 H04L9/32 H04L9/14

    摘要: The present invention is a platform and/or agnostic method and system operable to protect data, documents, devices, communications, and transactions. Embodiments of the present invention may be operable to authenticate users and may be operable with any client system. The method and system are operable to disburse unique portions of anonymous related information amongst multiple devices. These devices disburse unique portions of anonymous information and are utilized by the solution to protect sensitive data transmissions, and to authenticate users, data, documents, device and transactions. When used for authentication, login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.